Either that or merging the ad into the video stream itself. This would make it un-skippable, but would also be unblockable without stream processing (there are commercial skip options for ffmpeg and similar encoders, so not completely impossible, but much more work and more likely to mark real content as a commercial as well).
It’s not that expensive. You can mix or overlay stuff over a video stream fairly cheaply. Sure, it will be a hit overall for their bottom line but they’ll do it if they have to.
They can also turn on DRM for all videos on the platform. Currently it’s only used for paid videos and it’s very hard to bypass.
or merging the ad into the video stream itself. This would make it un-skippable
That’s not true. Besides the point that people can skip any video content manually anyway, I already use a Firefox addon called “SponsorBlock for YouTube - Skip sponsorships”, which is configurable and works for other sites as well. The skip points are community maintained, but with the help of AI it should be easy to detect ads automatically. The point is, there are already tools to help with skipping video encoded content.
Sponsor block demonstrates one approach to this. If everybody has the ad at the same time stamps, sponsor block would just work out of the box.
If they got creative and introduced different time stamps for the advertisements for different people, then we could do something like MD5 hash of different video payloads, and look for the MD5 hash that isn’t distributed to everybody, mark that as an advertisement
Theoretically they could deny serving byte ranges before the end-of-ad mark until those bytes have been served and a plausible time (the duration of the ad) has passed.
Practically this is likely more expensive than what the ad revenue would yield.
Sure, but then you just need a youtube front running cache that preloads videos, or load multiple videos at the same time… i know i’m not the only person who watches youtube at 3x speed, so you could speed up past the ad, etc.
Do these actually work against HDCP? (Outside using a camera, obviously). I know it used to work decently well against most “ordinary” attacks like VMs and capture cards.
Either that or merging the ad into the video stream itself. This would make it un-skippable, but would also be unblockable without stream processing (there are commercial skip options for ffmpeg and similar encoders, so not completely impossible, but much more work and more likely to mark real content as a commercial as well).
Thankfully it seems that encoding ads into the video stream is still too expensive for them to implement.
I’m assuming that asking CDNs to combine individualized ads with content and push the unique streams to hosts does not scale well.
It’s not that expensive. You can mix or overlay stuff over a video stream fairly cheaply. Sure, it will be a hit overall for their bottom line but they’ll do it if they have to.
They can also turn on DRM for all videos on the platform. Currently it’s only used for paid videos and it’s very hard to bypass.
That’s not true. Besides the point that people can skip any video content manually anyway, I already use a Firefox addon called “SponsorBlock for YouTube - Skip sponsorships”, which is configurable and works for other sites as well. The skip points are community maintained, but with the help of AI it should be easy to detect ads automatically. The point is, there are already tools to help with skipping video encoded content.
There’s nothing to skip if they overlay small ads while the content is playing.
On the bright side such small ads may be less annoying than full screen ads.
Sponsor block demonstrates one approach to this. If everybody has the ad at the same time stamps, sponsor block would just work out of the box.
If they got creative and introduced different time stamps for the advertisements for different people, then we could do something like MD5 hash of different video payloads, and look for the MD5 hash that isn’t distributed to everybody, mark that as an advertisement
Theoretically they could deny serving byte ranges before the end-of-ad mark until those bytes have been served and a plausible time (the duration of the ad) has passed. Practically this is likely more expensive than what the ad revenue would yield.
Sure, but then you just need a youtube front running cache that preloads videos, or load multiple videos at the same time… i know i’m not the only person who watches youtube at 3x speed, so you could speed up past the ad, etc.
They could use stream encryption (DRM) to ensure you’re viewing the ads as expected and make it hard to capture and playback.
Its a arms race, you could always just record the screen with a camera and edit it out as the ultimate.
you could spin up a vm, and capture the video output
you could use a graphics driver that lets you inspect the frame buffer, etc
you could use the side channel attacks to get the decrypted video frames, heartbleed etc, etc etc
Do these actually work against HDCP? (Outside using a camera, obviously). I know it used to work decently well against most “ordinary” attacks like VMs and capture cards.
I believe HDCP keys have already been leaked, I can find a couple different references to them on GitHub even.
Probs a sponsor block like thing could work
deleted by creator